DATA CHUNKING IN QUASI-SYNCHRONOUS DS-CDMA. A Thesis. presented to. the Faculty of California Polytechnic State University, San Luis Obispo

Size: px
Start display at page:

Download "DATA CHUNKING IN QUASI-SYNCHRONOUS DS-CDMA. A Thesis. presented to. the Faculty of California Polytechnic State University, San Luis Obispo"

Transcription

1 DATA CHUNKING IN QUASI-SYNCHRONOUS DS-CDMA A Thesis presented to the Faculty of California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Master of Science in Electrical Engineering by Trevor Dalke May 2014

2 2014 Trevor Dalke ALL RIGHTS RESERVED ii

3 COMMITTEE MEMBERSHIP TITLE: Data Chunking in Quasi-Synchronous DS-CDMA AUTHOR: Trevor Dalke DATE SUBMITTED: May 2014 COMMITTEE CHAIR: Dr. Vladimir Prodanov Assistant Professor Electrical Engineering COMMITTEE MEMBER: Dr. Dennis Derickson Department Chair Electrical Engineering COMMITTEE MEMBER: Dr. Jane Zhang Associate Professor Electrical Engineering iii

4 ABSTRACT Data Chunking in Quasi-Synchronous DS-CDMA Trevor Dalke DS-CDMA is a popular multiple access technique used in many mobile networks to efficiently share channel resources between users in a cell. Synchronization between users maximizes the user capacity of these systems. However, it is difficult to perfectly synchronize users in the reverse link due to the geographic diversity of mobile users in the cell. As a result, most commercial DS-CDMA networks utilize an asynchronous reverse link resulting in a reduced user capacity. A possible compromise to increase the user capacity in the reverse link is to implement a quasi-synchronous timing scheme, a timing scheme in which users are allowed to be slightly out of synchronization. This paper suggests a possible way to implement a quasi-synchronous DS-CDMA reverse link using the method of data chunking. The basic premise is derived by making a link between TDMA and synchronous DS-CDMA. By considering some basic TDMA limitations, a proposed data chunked quasi-synchronous DS-CDMA system is derived from a TDMA system. The effects of such a system are compared to those of a chip interleaved system. MATLAB simulations are performed to analyze the performance of the system in the presence of small synchronization errors between users. Implementation of guard bands is explored to further reduce errors due to imperfect synchronization between users. iv

5 TABLE OF CONTENTS LIST OF TABLES... viii LIST OF FIGURES... ix 1 Introduction Background Cellular Network Overview Comparison of Multiple Access Techniques Channel Resources Time Division Multiple Access Frequency Division Multiple Access Code Division Multiple Access DS-CDMA Overview DS-CDMA System Spread Spectrum Nature of DS-CDMA DS-CDMA Timing Multiple Access Interference DS-CDMA Characteristics Privacy Jam Resistance Frequency Reuse Soft Handoff Resistance to Multipath Fading Power Control Implementation of DS-CDMA Properties of Spreading Codes Cross Correlation Autocorrelation Forward Link Orthogonal Spreading Codes v

6 3.2.1 Walsh Code Generation Example Synchronous DS-CDMA System Walsh Cross Correlation Reverse Link Orthogonal Spreading Codes Asynchronous Spreading Codes Quasi-Synchronous Spreading Codes Forward Error Correction Interleaving Basic Concept Block Interleaving Chip Interleaving Block Diagram of a Commercial DS-CDMA System Forward Link Reverse Link Proposed System Derivation TDMA to CDMA Chunking in TDMA Chunking in DS-CDMA Relation to Chip Interleaving Implementation Transmitter Design Receiver Design Example Baseband Chunking System Possible Benefits of Chunking Resistance to Small Synchronization Errors between Users Resistance to Burst Interference Flexibility vi

7 5 Simulation Strategy Assumptions Simulation Model General Practices Simulation Results Walsh Cover Cross Correlation Spreading Properties Spectrum of Non-Chunked System Spectrum of a Chunked System Simulations of Complete System Error Distributions Effect of increasing Shift Magnitude Error Magnitude vs. Symbol Position Bit Error Rate vs. Symbol Number Implementation of Guard Bands Conclusion Summary of Results Future Work References Appendix A: Glossary of Terms Appendix B: Matlab Code System Functions Additional Functions Simulations Appendix C: Analysis of Senior Project Design vii

8 LIST OF TABLES Table 1: Modern Mobile Wireless Standards [4-6]... 2 Table 2: DS-CDMA Encoding Example Table 3: DS-CDMA Decoding Example Table 4: 2 User TDMA Signal with 1 Symbol Time Slots Table 5: 2 User Sum and Difference Signal Table 6: 4 User DS-CDMA System Table 7: Codes for 4 User System Table 8: TDMA with Guard Bands Table 9: TDMA with 2 Symbol Chunks Table 10: TDMA with 3 Symbol Chunks Table 11: DS-CDMA with 3 Symbol Chunks Table 12: All possible chunks for a 2x4 set of messages Table 13: Compressing and Repeating Chunks Table 14: Walsh Cover for Different Chunk Sizes Table 15: Encoding and Superposition in Channel Table 16: Decoding the Chunked DS-CDMA Signal viii

9 LIST OF FIGURES Figure 1: Forecasted Growth of Mobile Traffic [2]... 1 Figure 2: Cellular Network Layout [11]... 3 Figure 3: TDMA Frame Structure [14]... 5 Figure 4: TDMA vs. FDMA [15]... 6 Figure 5: CDMA [15]... 7 Figure 6: DS-CDMA Block Diagram... 8 Figure 7: Applying the Spreading Code[18]... 9 Figure 8: Correlation Receiver to Recover s1(t)... 9 Figure 9: Spreading the Spectrum [19] Figure 10: Multipath [15] Figure 11: Rake Receiver Figure 12: Walsh Code Generation [30] Figure 13: 64 Code Walsh Set Figure 14: Cross Correlation of 64 User Walsh Set Figure 15: Interleaving a 16 Symbol Message Figure 16: Packet Loss in Interleaved System Figure 17: Block Interleaving Transmitter Figure 18: Chip Interleaving Transmitter Figure 19: IS-95 Forward Channel [36] Figure 20: IS-95 Reverse Channel [36] Figure 21: Chip Interleaving Due to Chunking Figure 22: Chunking Transmitter Figure 23: 4 Symbol Compress and Repeat Block Figure 24: Summing Revolver with 2 Users and 4 Symbol chunks Figure 25: System Block Diagram Figure 26: Cyclic Cross Correlation between Chunked Walsh Codes Figure 27: Compressed Message Spectrum Figure 28: Encoded Message Spectrum vs. Walsh Code Spectrum Figure 29: Walsh Code Spectrum Figure 30: Chunked Encoded Message Spectrum ix

10 Figure 31: Error Distributions for Varying Chunk Sizes Figure 32: Mean Error vs. Chunk Size Figure 33: Error Variance vs. Chunk Size Figure 34: Bit error rate vs. Chunk Size Figure 35: Error Variance vs. Maximum Shift Size Figure 36: Bit error rate vs. Maximum Shift Size Figure 37: Error Magnitude by Position for Maximum Allowed Shift = 1 Chip Figure 38: Error Magnitude by Position for Maximum Allowed Shift = 2 Chips Figure 39: Bit Error Rate vs. Position, Chunk Size = 1 Symbol Figure 40: Bit Error Rate vs. Position, Chunk Size = 4 Symbols Figure 41: Received Bit Error Rate vs. Position, Chunk Size = 16 Symbols Figure 42: Bit Error Rate vs. Position, Chunk Size = Figure 43: Fraction of Quarantined Symbols vs. Chunk Size x

11 1 Introduction Over the past decade, there has been an explosion in mobile data consumption driven by the development of inexpensive, widely available wireless devices [1]. Innovations in wireless technology have allowed for the development of advanced cellular networks capable of supporting rapidly increasing traffic. As shown in figure 1, mobile traffic is expected to continue its rapid growth for the foreseeable future. Maintaining this rate of growth will be a technological challenge that will require continued innovation of advanced cellular networks. Figure 1: Forecasted Growth of Mobile Traffic [2] Efficiently sharing the network resources between many users is critical to maximizing the capacity of a network. The methods used to accomplish this are known as multiple access techniques, as they allow many users to communicate within a single cell. The continued growth of mobile data consumption is largely dependent on the continued improvement of these techniques. 1

12 DS-CDMA (Direct Sequence Code Division Multiple Access) has been the dominant multiple access technique in recent years. It is currently used in many wireless systems, and will likely continue to be used for a long time. Table 1 shows the multiple access techniques used in modern systems, and other relevant information about the systems. Modern variants of DS-CDMA systems include the CDMA2000 and HSPA+ (WCDMA) standards [3]. Channel BW Downstream Upstream Name Modulation (MHz) (Mbit/s) (Mbit/s) EDGE (2.9G) TDMA/FDMA CDMA2000 (3G) DS-CDMA HSPA+ (3.5G) DS-CDMA LTE (4G) OFDMA 1.4,3,5,10,15, Table 1: Modern Mobile Wireless Standards [4-6] While OFDMA has gained favor over DS-CDMA for 4G systems, DS-CDMA based systems are still a strong contender for future wireless standards, and continue to be developed [7]. Some of the more promising DS-CDMA based methods being developed include multicarrier CDMA (MC-CDMA) [8] and collaborative CDMA [9]. These potential systems offer advantages that cannot be achieved through current LTE technology. The objective of this paper is to develop a possible improvement to existing and future DS-CDMA based systems, and to investigate the characteristics of such a system. 2

13 2 Background 2.1 Cellular Network Overview Cellular networks are broken up into non-overlapping hexagonal geographic areas called cells. Within each cell is a base station. This base station manages and communicates with the devices within its cell. Neighboring base stations also communicate with each other to prevent interference between cells. A typical cell structure is shown in figure 2. Cells may be designed to support hundreds of users [10]. Figure 2: Cellular Network Layout [11] This communication is bidirectional, with all communications from the base station to the user known as the downlink or forward link, and communications from the user to the base station known as the uplink or reverse link. These communications occur over many different frequency channels using multiple access techniques to avoid interference between users. Because mobile devices have a much more limited transmitter and receiver, most communication strategies involve the base station doing 3

14 the majority of the work. As a result, the forward and reverse links are often asymmetric [10]. 2.2 Comparison of Multiple Access Techniques Channel Resources Multiple access methods are multiplexing schemes, designed to efficiently share the capacity of a channel between many users. The two main components of the transmission that can be shared among the users are the frequency band and time allocations. The frequency spectrum over which mobile devices can communicate is limited to between about 300MHz and 3GHz. The Federal Communications Committee (FCC) regulates usage of these frequencies, assigning different frequency bands to different parties [10]. Because mobile devices generally do not transmit data and receive data continuously, time is considered a resource that can be shared. Multiple access schemes can take advantage of this by scheduling mobile devices so as not to interfere, and dynamically allocating channel resources to active devices. Naturally, the two simplest ways to share the channel resources are to either separate users in the time domain as in TDMA (Time Division Multiple Access), or in the frequency domain as in FDMA (Frequency Division Multiple Access). Many practical systems, such as LTE and GSM, utilize variations on one or both of these techniques [12, 13]. To illustrate how each of these work, consider a channel shared by K users that has a total bandwidth Wt transmitting over a frame with a time period Tt Time Division Multiple Access In a TDMA scheme, each frame s time period is divided up into K time slots of period T=Tt/K. Each time slot is assigned to a different user, so that only one user is 4

15 utilizing the channel at a time. Because there is no overlapping between users, all users in this system are orthogonal and do not interfere with each other. This allows them to be easily separated at the receiver. Since all users transmit over equal time periods at the same data rate, they each occupy the same bandwidth W=Wt [13]. A typical TDMA frame structure is shown in figure 3. Figure 3: TDMA Frame Structure [14] Frequency Division Multiple Access FDMA is the contrast strategy to TDMA. Instead of sharing the time resource, FDMA users share the frequency resource. This is done by partitioning the channel of the cell into K non-overlapping sub-channels of bandwidth W=Wt/K. Each user is assigned its own unique sub-channel, over which it can transmit continuously, utilizing the entire time resource T=Tt. Because the sub-channels do not overlap, users are orthogonal and do 5

16 not interfere with each other [15]. A comparison of the structure of TDMA and FDMA is shown in figure 4. Figure 4: TDMA vs. FDMA [15] Code Division Multiple Access CDMA (Code Division Multiple Access) approaches this problem differently, with each user occupying the entire time interval T=Tt, over the entire bandwidth W=Wt. Instead of separating users through either time or frequency, users are separated through orthogonality between the messages themselves. This orthogonality is granted by applying a unique orthogonal code to each user. The orthogonality between users effectively separates users into K sub-channels like those used in FDMA. However, these sub-channels are all over the same bandwidth and are therefore stacked on top of one another like in TDMA [16]. The orthogonal channel structure of CDMA is represented in figure 5. 6

17 Figure 5: CDMA [15] 2.3 DS-CDMA Overview DS-CDMA System The most popular types of CDMA used in mobile communications is known as Direct Sequence CDMA (DS-CDMA). This type of CDMA will be the focus of this paper. A basic DS-CDMA link is shown in figure 6. It consists of the transmitter, channel and receiver. 7

18 Transmitter Channel Receiver s 1 (t) s 1 (t) g 1 (t) Acos(ω c t) Acos(ω c t+θ) g 1 (t) s 2 (t)... g 2 (t) Acos(ω c t) r(t) Acos(ω c t+θ) g 2 (t)... s 2 (t) s N (t) s N (t) g N (t) Acos(ω c t) Acos(ω c t+θ) g N (t) Figure 6: DS-CDMA Block Diagram In this system, there are N users, each transmitting a baseband message: s 1 (t), s 2 (t),, s N (t). They are separated by multiplying each signal by a unique orthogonal spreading code: g 1 (t), g 2 (t),, g N (t). This results in the signals: s 1 (t)g 1 (t), s 2 (t)g 2 (t),, s N (t)g N (t). These spreading codes are applied at a much higher bit rate than the bit rate of the original signals, chipping the signal in the time domain and spreading the spectrum in the frequency domain [17]. The bit rate of the spreading codes is known as the chip rate. This process is represented in the time domain in figure 7. 8

19 Figure 7: Applying the Spreading Code[18] These spread signals are BPSK modulated up to the carrier frequency, then transmitted. In the channel, the modulated signals sum together forming the single composite signal r(t). If the desired signal to be received is s 1 (t), then the basic necessary receiver necessary to recover message is shown in figure 8. This type of receiver is known as a correlation receiver. r(t) b(t) s 1 (t) Acos(ω c t+θ) g 1 (t) Figure 8: Correlation Receiver to Recover s 1 (t) The receiver first down-converts the received signal, r(t), recovering the baseband signal: b(t) = s 1 (t)g 1 (t) + s 2 (t)g 2 (t) + + s N (t)g N (t). To decode each message, 9

20 the receiver multiplies the baseband signal by the appropriate spreading code. If the desired signal to be decoded is s 1 (t), then b(t) is multiplied by g 1 (t) resulting in the composite signal: b(t)g 1 (t) = s 1 (t)g 1 (t) 2 + s 2 (t)g 1 (t)g 2 (t) + + s N (t)g 1 (t)g N (t). The resulting signal is integrated one symbol period at a time, to recover the signal s 1 (t): T s 1 (t) = b(t)g 1 (t)dt 0 T = s 1 (t)g 1 2 (t) + s 2 (t)g 1 (t)g 2 (t) + + s N (t)g 1 (t)g N (t)dt 0 T T T = s 1 (t) g 2 1 (t)dt + s 2 (t) g 1 (t)g 2 (t)dt + + s N (t) g 1 (t)g 2 (t)dt (s 1 (t), s 2 (t),, s N (t) constant over integration interval) T Spreading codes are chosen to be orthogonal to each other, meaning that g 2 i (t)dt 0 T and g i g j (t)dt 0 s 1 (t) = s 1 (t) = 0 for i j. Therefore: The base station receiver has many branches to decode all of the users transmitted signals, while a mobile receiver will typically only decode a single message [17]. Because noise is generally uncorrelated to the signals it is almost completely rejected by the correlation receiver. = 1, Spread Spectrum Nature of DS-CDMA The use of spreading codes in DS-CDMA make it a member of the spread spectrum modulation family. The ratio of the chip rate of the spreading code to the 10

21 symbol rate of the baseband message signal in a spread spectrum system is known as the spreading factor or the processing gain G p. The spectrum of the signal is spread in the frequency domain by the processing gain. Because power remains constant during the process of spreading, the amplitude of the spread message decreases by 1/G p [19]. This spreading of the spectrum is shown in figure 9. Figure 9: Spreading the Spectrum [19] De-spreading the signal at the receiver by multiplying the signal by the correct spreading code at the receiver restores the original narrow band signal. Using the incorrect spreading code to de-spread the signal does not restore the original signal DS-CDMA Timing The type of timing used in DS-CDMA has a large impact on the design of the system. There are two primary types of timing schemes, synchronous and asynchronous. Synchronous systems utilize spreading codes that are perfectly orthogonal, resulting in minimal interference between users. However, synchronous systems can be difficult to 11

22 implement because they require precise timing. In most systems, the forward link is synchronous due to all of the transmitted signals originating from the same point simultaneously. In the reverse link, synchronization between users is difficult because of the spatial diversity and less accurate clocks used on mobile devices. The reverse link is therefore usually operated asynchronously, where the users transmit independently of each other. This comes at the cost of increased interference between users, limiting the capacity of the system [20] Multiple Access Interference The primary reason that synchronous systems are preferred to asynchronous systems is that synchronous systems exhibit less interference between users. This is because synchronous systems utilize perfectly orthogonal spreading codes, while asynchronous systems utilize spreading codes that have finite correlation [16]. This finite correlation causes interference between users. This interference is known as multiple access interference (MAI). While MAI is generally small for most asynchronous spreading codes, it increases with each user. Given the process gain G p and the number of users in the cell M, the received signal to interference ratio E b /I 0 is: E b = G p I 0 M 1 [17] MAI is the primary source of interference in the reverse link, and is what ultimately limits the number of users in the cell. Because MAI gradually increases with the number of users in the cell, all users in the cell experience a gradual decline in performance as users are added to the system [21]. 12

23 2.4 DS-CDMA Characteristics Privacy CDMA systems have inherent privacy built into them. Only authorized users are able to receive the signal, because picking up the signal requires knowledge of the correct spreading code. Attempting to decode the signal using an incorrect spreading code does not restore the original signal, because it is generally not correlated to the signal. The spreading code cannot be easily guessed, because it is typically a very long pseudorandom sequence. Most DS-CDMA standards use a code known as the long code, a PN (pseudonoise) code with a period of bits to provide this privacy [22] Jam Resistance Jamming of a signal is the process of intentionally interfering with a transmission. This is typically done by transmitting a narrowband jamming signal near the frequency of the signal to be jammed. However, this strategy is ineffective for spread spectrum systems because the jamming signal is generally uncorrelated to the signal. Because of this, the power of the jamming signal is spread at the receiver. So while it does interfere with the received signal, the power of the jamming signal over the bandwidth of the jammed signal after de-spreading the signal is very low [17] Frequency Reuse DS-CDMA has a frequency reuse factor of 100%. This means that neighboring cells can operate over the same frequencies without interference. This is due to the fact that in addition to separating signals within a cell, codes can be applied to separate signals from neighboring cells. The frequency reuse factor of TDMA and FDMA systems is less than 100%, meaning that neighboring cells cannot operate over the same 13

24 frequencies unless they are spaced sufficiently far apart. This is because there is no way to separate interfering TDMA or FDMA signals from neighboring cells. As a result, properly designed multicellular DS-CDMA systems generally have a much higher user capacity than pure TDMA or FDMA systems [21] Soft Handoff In cellular systems it is often necessary to transfer mobile users from one cell into another through the process known as a handoff. The preferred type of handoff is known as a soft handoff. A soft handoff is a seamless handoff in which the mobile device connects to a new cell before terminating connection to the previous cell. This provides a seamless transition that is undetectable to the user. The alternative, the hard handoff, breaks the old connection before connecting to the new cell. This results in an unfavorable abrupt change in signal strength. Due to the fact that neighboring cells operate over the same frequencies, soft handoffs are much easier to implement in DS-CDMA systems than in other types of systems. Additionally, soft handoffs have the added benefit of increasing the user capacity of the reverse link. For these reasons, soft handoffs are standard in most DS- CDMA systems. This is in contrast to most other systems, where soft handoffs are rarely implemented due to them being much more difficult to implement. These other systems must instead use hard handoffs [23] Resistance to Multipath Fading Mobile channels tend to exhibit large amounts of multipath fading, destructive interference from delayed and attenuated versions of the original signal. Multipath is caused by reflections and atmospheric effects, as shown in figure

25 Figure 10: Multipath [15] Multipath fading can be detrimental to many types of systems. However, DS-CDMA is resistant to multipath fading because the multipath signals are generally poorly correlated with the original message. They are therefore mostly rejected by the correlation receiver. Power lost to multipath can be recovered through the use of a modified correlation receiver known as a rake receiver. A common rake receiver architecture designed to recover a single message is shown in figure 11 [24]. 15

26 g n (t) r(t) Acos(ω c t+θ) g n (t-τ 1 )... s n (t) g n (t-τ M ) Figure 11: Rake Receiver The rake receiver has many fingers to decode a single message and its multipath components. To accomplish this, each finger applies the same spreading code shifted by a different amount in time. The recovered multipath components, as well as the principle component are appropriately shifted then summed together. This results in a much stronger recovered signal [25] Power Control Because of the varying location of users with respect to the base station, the signals transmitted by mobile users tend to attenuate varying amounts. Signals transmitted by users near the base station tend to receive little attenuation while far away users tend to be greatly attenuated. If all of the mobile devices were to transmit using the same power, the signals received by the base station would vary in amplitude. While this is not typically a problem for TDMA or FDMA, DS-CDMA relies upon all received 16

27 signals having roughly the same power level. The solution to this problem is for the base station to carefully control the transmit power of each of the mobile device to ensure that each signal is roughly equal in amplitude when received by the base station [26]. 17

28 3 Implementation of DS-CDMA While the concept behind DS-CDMA is relatively simple, many important design considerations must be taken into account to maximize the efficiency of the system. Several of the important components of a practical DS-CDMA system will be discussed in the following sections. 3.1 Properties of Spreading Codes The interference between users in DS-CDMA is primarily a function of the spreading codes used in the system. These properties can be quantified through the correlational properties of the codes Cross Correlation The cross correlation between two real valued functions, X and Y, is defined to be: R XY (τ) = X(t)Y(t + τ) dτ [27]. It provides a statistical method for comparing the similarity between two signals as they are shifted past one another. For a particular delay, τ, the value of the cross correlation gives a measure of similarity. When the cross correlation is equal to zero, the two functions are orthogonal. The cross correlation properties of spreading codes are important, because the cross correlation properties of the spreading code are inherited by the spread message. Multiple access interference (MAI) is directly related to the cross correlation between users. To minimize the MAI of the system, the cross correlation between spreading codes in a set should be minimized [17]. 18

29 3.1.2 Autocorrelation The autocorrelation function is simply the cross correlation between a function and itself: R x (τ) = X(t)X(t + τ) dτ [27]. As such, the autocorrelation function always has a peak at τ = 0. A spreading code that has an autocorrelation peak at τ = 0, and is zero everywhere else is uncorrelated with delayed copies of itself. A spreading code with these properties is highly desirable for the purposes of signal identification and rejection of multipath interference. The type of spreading code that closely approximates this desired autocorrelation function is the PN (Pseudonoise) code, a deterministically generated signal that has the properties of a random sequence [28]. 3.2 Forward Link Orthogonal Spreading Codes The forward link is nearly always synchronous. The most common type of orthogonal spreading codes used in synchronous systems are Walsh codes. Walsh codes possess the property of being perfectly orthogonal when synchronized Walsh Code Generation The Walsh code is a set of 2^N codes, 2^N symbols long. They are created from the Hadamard matrices. The lowest order Hadamard matrix is H 1 = 1. Each higher level of the Hadamard matrix is recursively generated through the Hadamard Transform: H N+1 = [ H N H N H N H N ], where H N is the inverse of H N. Through this process, the second order Hadamard matrix is generated: H 2 = [ 1 1 ]. The corresponding Walsh codes are 1 1 simply the rows of the Hadamard matrix. So from this matrix we obtain the Walsh codes W(2,1) = [1 1] and W(2,2) = [1 1]. This process of Walsh code generation can 19

30 be represented by the tree diagram in figure 12. It can be continued to create an arbitrarily large number of Walsh codes [29]. Figure 12: Walsh Code Generation [30] In practice however, other less computationally intensive methods are often used to construct these Walsh codes, such as the Fast-Walsh Fourier Transform [31]. The ease of Walsh code generation is one of the reasons that the Walsh code is the preferred orthogonal spreading code. The CDMA2000 standard uses a set of 256 Walsh codes, and the older standard IS-95 uses 64 Walsh codes. Figure 10, below, is a representation of all codes used in a 64x64 set, as would be used in the IS-95 standard. 1 is represented by a white square, and -1 is represented by a black square [26]. 20

31 Figure 13: 64 Code Walsh Set When used as a spreading code, the Walsh code is periodically applied at a fast rate so that each message symbol is multiplied by an entire Walsh code. For the IS-95 standard, this means that the Walsh codes are applied at a rate equal to 64 times the symbol rate. The rate at which the Walsh code is applied is known as the chip rate. Since the chip rate is 64 times the symbol rate in this case, the spectrum of these messages are effectively spread by a factor of 64. This repeated Walsh code is known as the Walsh cover, and can be used to spread a message of any arbitrary length [32] Example Synchronous DS-CDMA System To demonstrate how the Walsh code can be used as an orthogonal spreading code in synchronous DS-CDMA, consider the transmission of the two messages M1 and M2. We follow the steps covered previously to encode the messages, as shown in table 2. Each message is first multiplied by the Walsh cover. In this case, since there are two signals the Walsh cover is simply the repetition of: 21

32 W 2 = [ ] After multiplying the signals by the Walsh cover, the signals transmitted then summed in the channel. Message Signals M M Message Signals Sampled at Chip Rate M M Generate Walsh Cover W W Multiply Each Message by Walsh Cover M1*W M2*W Superposition of Encoded Messages Σ Table 2: DS-CDMA Encoding Example To decode the messages we use a correlation receiver, which multiplies the received signal by the appropriate Walsh code then integrates the result one symbol period at a time. This process is shown in table 3. Multiply Received Signal by Walsh Cover Σ*W Σ*W Integrate Over Symbol Period M M Table 3: DS-CDMA Decoding Example 22

33 3.2.3 Walsh Cross Correlation To illustrate the properties of the Walsh codes, the average normalized cyclic cross correlation between codes in a 64 Walsh set plotted in MATLAB is shown in figure 14. Figure 14: Cross Correlation of 64 User Walsh Set This cross correlation shows that the Walsh codes are indeed perfectly orthogonal to each other when synchronized. However, the cross correlation becomes finite and relatively large in systems that have any synchronization error between users. This confirms that any system that uses Walsh codes must require strict timing requirements to ensure complete synchronization between users. Even a difference of 1 chip between Walsh codes results in significant correlation between users [33]. 3.3 Reverse Link Orthogonal Spreading Codes Generally, the reverse link cannot be perfectly synchronized. As a result, some other timing scheme must be used. Typically these systems are either asynchronous, but quasi-synchronous reverse links have also been proposed. Each of these two cases utilize different spreading codes. 23

34 3.3.1 Asynchronous Spreading Codes The reverse link in most DS-CDMA systems is asynchronous, meaning that users transmit data at timings completely independently of each other. The asynchronous reverse link in IS-95 for example uses PN codes to separate users because they have low constant cross correlation with each other. There are many other types of asynchronous spreading codes that can be used in this type of system. As previously discussed, the disadvantage of using asynchronous spreading codes is that they always have a finite cross correlation between each other, leading to MAI [28] Quasi-Synchronous Spreading Codes An alternative to using an asynchronous reverse link is a quasi-synchronous reverse link. Such systems operate synchronously using spreading codes that are orthogonal when synchronized, and lose their orthogonality in a gradual manner. This allows the system to operate synchronously, but with some tolerance for synchronization errors between users. One proposed set of spreading codes is that of the scrambled Walsh code as suggested in [20]. This paper will explore the implementation of a quasisynchronous reverse link using Walsh codes. 3.4 Forward Error Correction Even in well-designed systems, there will be a finite number of errors resulting from the imperfect nature of communication channels. Because errors lead to a degradation of the user experience, nearly all digital communication systems employ forward error correction (FEC) to detect and correct these types of errors at the receiver. FEC is a type of channel coding, in which messages are encoded in a redundant way through the use of an error correction code (ECC). The resulting redundant bits are used 24

35 by the receiver to detect and correct errors. In cases where FEC is unable to completely correct the errors, the packet must be retransmitted through an automatic repeat request (ARQ). This results in large variable delays, and is therefore highly undesirable [34]. 3.5 Interleaving Basic Concept FEC can only effectively correct errors that are sufficiently spaced apart. FEC schemes are therefore ineffective at correcting long strings of errors, known as burst errors. The solution to this problem is to spread burst errors across the message by increasing the time diversity of the signal. This is done by mixing the bits of the signal in a predictable way before transmission (interleaving), then restoring them back to their original order (de-interleaving) at the receiver. An example of interleaving a message is shown in figure Original Message Interleaved Message Figure 15: Interleaving a 16 Symbol Message Now consider the case in which an entire packet is lost. If the original signal had been transmitted, then FEC would likely be insufficient because FEC is not capable of correcting long strings of errors. However, if the interleaved signal is transmitted then deinterleaved at the receiver this spreads the errors across the signal as in figure 16. This 25

36 case should be easily corrected through FEC due to the spreading out of the errors across the message [35] Interleaved Message With Packet Loss De-Interleaved Message Figure 16: Packet Loss in Interleaved System Block Interleaving There are two primary types of interleaving that can be used in DS-CDMA systems. Block interleaving refers to using an interleaver before spreading the signal, as in figure 17. This is the type of interleaving used in the majority of DS-CDMA systems, such as the IS-95 standard. De-interleaving is performed at the receiver after despreading the message using a correlation receiver [18]. Message Block Interleaver Modulator Walsh Cover Figure 17: Block Interleaving Transmitter Chip Interleaving Chip interleaving refers to using an interleaver after spreading the signal, as shown in figure 18. De-interleaving is performed at the receiver before de-spreading the system using the correlation receiver. Chip interleaving is much more effective when it 26

37 comes to mitigating burst errors, because it is able to interleave to a greater extent than block interleaving leading to greater time diversity. However, the hardware required to chip interleave is more difficult to implement because it is required to operate on a signal with a much higher bit rate [18]. Message Chip Interleaver Modulator Walsh Cover Figure 18: Chip Interleaving Transmitter 3.6 Block Diagram of a Commercial DS-CDMA System Now that the components have been discussed, a commercial DS-CDMA system can be analyzed. While many DS-CDMA standards exist, they are generally pretty similar. This paper will mostly consider the IS-95 standard, as it is the basis from which most other DS-CDMA standards were formed. Most properties of IS-95 can be generalized to the other types of systems. The block diagrams of the forward and reverse links are shown in figures 19 and 20. The actual systems are very complex, and many details will not be discussed. 27

38 3.6.1 Forward Link Figure 19: IS-95 Forward Channel [36] The forward channel of the IS-95 standard is synchronous DS-CDMA. The signals to be transmitted are broken into 20ms blocks at 9.6kbps. Forward error correction is applied to each of these signals through convolutional encoding, then block interleaving. This leaves the signal at a data rate of 19.2kbps. There are therefore 19.2kbps*20ms = 384 bits per block. The forward channel is synchronous, so the Walsh code is used to create the orthogonal channels. Each signal is assigned a unique code from the set of 64 Walsh codes. Because there are 64 Walsh codes, the Walsh cover is applied at a chip rate 64*19.2kbps = Mbps. The signal is also spread by the long code and two short codes in quadrature. The long code is a PN code that has a period of chips. This code is used to separate users in different base stations. The short code is a PN code that has a period of chips. All of spreading codes are applied at Mbps. The output signals are then filtered, and transmitted using QPSK modulation. Timing information is transmitted 28

39 through the use of a pilot channel and a sync channel. These channels are used to help the mobile receiver coherently demodulate the signal [32] Reverse Link Figure 20: IS-95 Reverse Channel [36] The reverse link is similar to the forward link, but with a few changes. The main difference is that the reverse link is asynchronous. While the Walsh code is used in the reverse link, it is not used for spreading. It is instead used for 64-ary modulation. The users are instead separated entirely by short codes. No timing information is transmitted in the reverse link. Instead, the timing information is extracted from the timing offset of the spreading codes [32]. 29

40 4 Proposed System 4.1 Derivation TDMA to CDMA A basic synchronous DS-CDMA system can be developed from a simple TDMA system if a few considerations are observed. Consider the two user system, consisting of User A and User B. The simplest TDMA scheme for these two users is to simply take turns transmitting one symbol at a time as in table 4. In order to maintain the original data rate of each signal, the TDMA signal is transmitted at twice the symbol rate. The TDMA signal therefore requires twice the bandwidth of the original messages. User A a1 a2 a3 a4 User B b1 b2 b3 b4 TDMA A a1 a2 a3 a4 TDMA B b1 b2 b3 b4 Table 4: 2 User TDMA Signal with 1 Symbol Time Slots One of its primary problems of such a system is its sensitivity to burst interference. If one or more time slots within a frame of the TDMA signal are completely wiped out due to any source of burst interference, one or more symbols between several users are completely lost because all of the information associated with the symbol is lost. This problem gets worse as the number of users increases due to the time slots getting smaller with a greater number of users. It would be preferable to develop a multiple access system in which burst interference is distributed among the users. This would ensure that each user faces an equal, less severe loss of signal when faced with burst interference than in the original TDMA signal. To accomplish this, we can transmit each symbol across multiple timeslots 30

41 on top of each other at the same rate as the TDMA signal. In order to do this we must maintain orthogonality between users. A common way to orthogonally combine two signals is to code the bits of the signal in sum and difference pairs. This allows the two individual signals to occupy one channel, while still being separable. This method is commonly used in stereo transmission, where the left (L) and right (R) channels are in bit pairs coded as L+R and L-R [37]. This process can be followed for the TDMA signal to combine user A and user B by treating them as the left and right channels, as shown in table 5. User A a1 a2 a3 a4 User B b1 b2 b3 b4 ΣΔ AB a1+b1 a1-b1 a2+b2 a2-b2 a3+b3 a3-b3 a4+b4 a4-b4 Table 5: 2 User Sum and Difference Signal Upon inspection, it is clear that we have constructed a basic synchronous DS-CDMA system using Walsh codes. User A s symbols were each multiplied by the code 1,1 and User B s symbols were multiplied by the code 1,-1. Thus, we have used a set of Walsh codes: W 2 = [ ] To consider how such a system with a larger number of users would work, consider the first symbol of a 4 user system. To establish orthogonality between users, we first make A and B orthogonal to each other and C and D orthogonal to each other. This is done by finding sum and difference between users A and B, and between users C and D as was done previously. To make the two resulting signals orthogonal, we can simply repeat this process by finding the sum and difference between these new signals, as shown in table 6. 31

42 User A a1 User B b1 User C c1 User D d1 ΣΔ AB a1+b1 a1-b1 ΣΔ CD c1+d1 c1-d1 ΣΔ ABCD (a1+b1)+(c1+b1) (a1+b1)-(c1+d1) (a1-b1)+(c1-d1) (a1-b1)-(c1-d1) Table 6: 4 User DS-CDMA System If we observe this resulting signal, we have created a set of four orthogonal codes. These codes are represented in table 7. ΣΔ ABCD (a1+b1)+(c1+d1) (a1+b1)-(c1+d1) (a1-b1)+(c1-d1) (a1-b1)-(c1-d1) Code for A Code for B Code for C Code for D Table 7: Codes for 4 User System Once again, through the basic process of finding the sum and difference, we have found another set of Walsh codes: W 4 = [ ] This process can be continued to develop a synchronous DS-CDMA signal for an arbitrary number of users, and the appropriate Walsh codes. By converting the TDMA system into a DS-CDMA system, we have solved the original problem of weakness to burst interference by implementing a system that has the burden sharing property. This exercise demonstrates the similarity between TDMA and synchronous DS-CDMA systems. We would like to further study the characteristics of TDMA so that we can better understand the characteristics of DS-CDMA systems. This will potentially allow us 32

43 to apply solutions to TDMA problems to a synchronous DS-CDMA system in an attempt to improve it Chunking in TDMA Synchronization between users is a major concern in TDMA systems and synchronous DS-CDMA systems. Users in perfectly synchronized TDMA systems do not interfere because users only transmit during their assigned time slot. When synchronization is not perfect, symbols between users begin overlapping resulting in interference. This problem becomes much worse in systems with more users, ultimately limiting the capacity of the system [13]. One possible solution to this problem is to include guard bands, intervals between time slots to help prevent interference between users. The duration of these intervals should be longer than the uncertainty in the synchronization error so as to prevent intersymbol interference. However, this strategy becomes problematic with larger synchronization uncertainty as the guard bands become large relative to the time slot intervals. This results in a significant reduction of the effective data rate, making this method unfeasible for some channels. Table 8 shows the previously used TDMA example with the addition of guard bands between users. User A a1 a2 a3 a4 User B b1 b2 b3 b4 TDMA A a1 a2 a3 a4 TDMA B b1 b2 b3 b4 Table 8: TDMA with Guard Bands Since the guard band interval is limited by the time slot interval, most TDMA systems use larger time slots and each user transmits many symbols, a chunk of data, per time slot. This has the effect of reducing the total number of time slots, and the 33

44 number of guard bands required. Because fewer guard bands are necessary, this would also allow for the guard bands to be larger, allowing for more uncertainty in the synchronization between users. An example of chunked TDMA, where each chunk consists of 2 symbols is shown in table 9. User A a1 a2 a3 a4 User B b1 b2 b3 b4 TDMA A a1 a2 a3 a4 TDMA B b1 b2 b3 Table 9: TDMA with 2 Symbol Chunks The chunked TDMA signal requires fewer guard bands because it requires fewer frames to transmit the same amount of data. It can therefore support larger guard bands while still maintaining a reasonable data rate. The cost of doing this is additional latency. In this example, User B experiences 3 times as much latency as the non-chunked case. This can be extended to larger chunk sizes. Table 10 shows the previous TDMA signal with 3 symbol chunks. User A a1 a2 a3 a4 User B b1 b2 b3 b4 TDMA A a1 a2 a3 TDMA B b1 b2 b3 Table 10: TDMA with 3 Symbol Chunks In this case, User B faces 5 times as much latency as the non-chunked case. From these examples, it is clear that some users in chunked TDMA face large amounts of latency. It can be shown that maximum delay experienced due to this phenomenon is approximately equal to the frame period of the signal. Because a frame consists of one time slot from each user, the frame period is dependent on the number of users, and duration of each 34

45 time slot. As a result, the maximum latency of a chunked TDMA signal becomes very large with a larger number of users and a larger chunk size. This latency is a limiting factor in practical TDMA systems. For example, GSM TDMA channels have frames consisting of 456 bits transmitted at a data rate of 22.8 kbps. This means that each channel has an inherent minimum latency of 456/22800 = 20 ms, without even considering other sources of delay. This is a fundamental limitation of TDMA systems [13] Chunking in DS-CDMA To improve this latency, we can transform this chunked TDMA signal into a synchronous DS-CDMA signal by applying the sum and difference strategy used previously, considering each of the chunks to be a unit as shown in table 11. User A a1 a2 a3 a4 User B b1 b2 b3 b4 Chunk A a1 a2 a3 a1 a2 a3 Chunk B b1 b2 b3 b1 b2 b3 CDMA a1+b1 a2+b2 a3+b3 a1-b1 a2-b2 a3-b3 A Code 1 1 B Code 1-1 Table 11: DS-CDMA with 3 Symbol Chunks Notice that the latency of this implementation is the same for all users and is independent of the chunk size. It is only dependent on the number of users. In fact, the latency is simply equal to the symbol period of the original message. Because of this, DS-CDMA can use any chunk size while maintaining a low amount of latency for all users Relation to Chip Interleaving This method of chunking essentially chip interleaves the DS-CDMA system. This can be realized by comparing the DS-CDMA system without chunking to one with 35

46 chunking. Figure 21 shows the chip interleaved nature of the 3 symbol chunked DS- CDMA signal. Figure 21: Chip Interleaving Due to Chunking In this example, it is clear that none of the data to be transmitted is altered. It is merely rearranged in a predictable fashion. By chunking the data, we have essentially created a chip interleaved DS-CDMA system without the use of a dedicated chip interleaver. This interleaving only occurs across the symbols contained in one chunk. Since the chunk size is only 3 symbols in this case, only 3 symbols get interleaved at a time. This result makes clear that if we wish to maximize the time diversity of the system, we should use the largest possible chunk size. 4.2 Implementation Transmitter Design The transmitter required to make the chunked DS-CDMA system work is a slight modification of a basic DS-CDMA transmitter. It takes the message to be encoded, then compresses and repeats the signal one chunk at a time to make the chunked signal. This signal is then multiplied by the Walsh cover, a Walsh code that repeats once per each compressed chunk. A simplified block diagram of the chunking process is shown in figure

47 Message Compress And Repeat Modulator Walsh Cover Figure 22: Chunking Transmitter To implement this system, we need the compress and repeat block. A possible implementation is shown in figure 23. Consider the case in which there are N users, which a desired chunk size M. Incoming Data Switches at R data /(Chunk Size) b4 b8 z -1 b3 z -1 b7 z -1 z -1 b2 b6 z -1 z -1 b1 b5 Switches at R data /(Chunk Size) Chunked Data Switches at R chip Switches at R chip Figure 23: 4 Symbol Compress and Repeat Block This block can be created using two circular buffers of length M, and a 2 to 1 mux. One register loads chunks of data at the symbol rate, while the other rotates at a fast rate, Rchip. 37

48 The faster rate is equal to the chip rate, the original data rate of the message times the number of users in the system. The two registers continually alternate roles. The 2 to 1 multiplexer samples the rotating register to create the chunked signal. This example can create chunks up to 4 symbols long. The basic idea can be extended to arbitrarily large chunk sizes Receiver Design The receiver necessary to decode this is a variation on the correlation receiver. It multiplies each signal by the appropriate Walsh cover, at the same data rate originally used. This results in N total received messages. These messages are still chunked, and at the chip rate. To decode these messages, we use a summing revolver of length M. This device sums N bits M chips apart of the received baseband signal b(k) to recover the decoded signal d i (n) using the appropriate Walsh cover W i (k)as expressed: N 1 d i (n) = 1 N W i(km + n) b(km + n), 0 n < M k=0 After decoding M symbols of the signal, the summing revolver must be advanced by (M 1) N chips. The process is repeated until the entire signal is recovered. The process is visualized in figure 24 for a system with a chunk size M=4 symbols and N=2 users. 38

49 Recovered Signal: s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 Chip # Chunk 1 Chunk 2 Chunk 3 Chunk 4 Figure 24: Summing Revolver with 2 Users and 4 Symbol chunks In this example, M=4 and N=2. Therefore, the signal is broken up into M=4 chip blocks. Since N=2 users, each symbol is composed of two chips. This diagram depicts the two chips that must be integrated at a time to recover each symbol. Note that each chip is only integrated once. 4.3 Example Baseband Chunking System To demonstrate the full process in a baseband system as will later be simulated, consider the two signals M1 and M2 transmitted by two different users. Since these signals are only 4 symbols, there are only three ways that they can be divided up into equal sized chunks. These options are shown below, table 12. In this example, the symbols are color coded for clarity. 39

50 Breaking the Message Signals into Equal Sized Chunks Message Signals M(1) M(2) Chunk Size = 1 Symbol Chunk 1 Chunk 2 Chunk 3 Chunk 4 M1(1) M1(2) Chunk Size = 2 Symbols Chunk 1 Chunk 2 M2(1) M2(2) Chunk Size = 4 Symbols Chunk 1 M4(1) M4(2) Table 12: All possible chunks for a 2x4 set of messages Each of these chunks is compressed and repeated to make the chunked signals R(1) and R(2). Since there are only two messages being encoded, they are compressed by a factor of 2. This process is shown in table 13. Compressing and Repeating Each Chunk Chunk Size = 1 Symbol Chunk 1 Chunk 1 Chunk 2 Chunk 2 Chunk 3 Chunk 3 Chunk 4 Chunk 4 R1(1) R1(2) Chunk Size = 2 Symbol Chunk 1 Chunk 1 Chunk 2 Chunk 2 R2(1) R2(2) Chunk Size = 4 Symbols Chunk 1 Chunk 1 R4(1) R4(2) Table 13: Compressing and Repeating Chunks 40

51 Each compressed and repeated section gets multiplied by the Walsh code. Since there are two signals in this case, we use: W = [ ] This Walsh code is applied over each chunk. Therefore, the Walsh code must be applied at a different bit rate for each chunk size. This repeated Walsh code is referred to as the Walsh cover, and is shown in table 14. Generating Walsh Cover Chunk Size =1 Symbol, Walsh Compressed and Repeated 4 times W 1(1) W 1(2) Chunk Size =2 Symbols, Walsh Compressed and Repeated 2 times W 2(1) W 2(2) Chunk Size =4 Symbols, Walsh Compressed and Repeated 1 time W 4(1) W 4(2) Table 14: Walsh Cover for Different Chunk Sizes Each message is multiplied by the appropriate Walsh cover, then transmitted. Under ideal conditions, in a perfect channel, the baseband signals sum together with no offset regardless of the carrier frequency. This process can be seen in table

52 Encoding and Superposition in Channel Chunk Size =1 Symbol R 1(1)* W 1(1) R 1(2)* W 1(2) Σ Chunk Size =2 Symbols R 2(1)* W 2(1) R 2(2)* W 2(2) Σ Chunk Size =4 Symbols R 4(1)* W 4(1) R 4(2)* W 4(2) Σ Table 15: Encoding and Superposition in Channel This composite signal Σ is received at the receiver. To recover each of the two messages, the signal is multiplied by the same Walsh cover as was used for encoding. The resulting signals are integrated using the summing revolver. In this example, the chips that are integrated together are chips of the same color. The result of the decoding process is shown in table

53 Decoding Chunk Size =1 Symbol Chunk 1 Chunk 1 Chunk 2 Chunk 2 Chunk 3 Chunk 3 Chunk 4 Chunk 4 Σ 1* W 1(1) Σ 1* W 1(2) M 1 (1) M 1 (2) Chunk Size =2 Symbols Chunk 1 Chunk 1 Chunk 2 Chunk 2 Σ 2* W 2(1) Σ 2* W 2(2) M 2 (1) M 2 (2) Chunk Size =4 Symbols Chunk 1 Chunk 1 Σ 4* W 4(1) Σ 4* W 4(2) M 4 (1) M 4 (2) Table 16: Decoding the Chunked DS-CDMA Signal This system has demonstrated the basic method of encoding and decoding the chunked DS-CDMA system. This general method can be extended to any chunk size, the only requirement is that the chunks are of equal size. 4.4 Possible Benefits of Chunking Resistance to Small Synchronization Errors between Users Because the Walsh code is applied over chunks rather than individual symbols, the Walsh cover used in DS-CDMA is much more slowly varying. This suggests that chunked Walsh covers should lose orthogonality to each other in a more gradual manner. This means that multiple access interference should be small for small shifts between users. Chunking may also offer some protection to symbols near the center of the chunks, as only the edges of the chunks should interfere in the presence of small shifts. If this is 43

54 true, then the addition of guard bands at the edges of the chunks should further decrease the bit error rate of the system Resistance to Burst Interference Chunking the signal adds time diversity to the system, because it breaks the symbols up and spreads them throughout the signal. Burst interference therefore only results in the loss of a piece of several symbols rather than the complete loss of a few symbols. Loss of a small piece of a symbol should not be a problem, as it is only one of many pieces. Combined with forward error correction, the system should be strong against burst interference Flexibility This method has a lot of flexibility built into it because of its ability to operate with many different chunk sizes. In the case with the 1 symbol chunks, the process is identical to that of a system with no interleaving. Other degrees of interleaving are obtained by simply varying the size of the chunks, and the rate at which the Walsh code is applied. Maximum interleaving is achieved by simply using a chunk size equal to the length of the signal. Decoding the signal can be done with a slightly modified correlation receiver. 44

55 5 Simulation Strategy 5.1 Assumptions To evaluate the impact that data chunking has on a DS-CDMA system, a baseband DS-CDMA system was simulated in MATLAB. The primary goal of these simulations was to test the proposed system in a quasi-synchronous environment to evaluate its viability. In this simulation, only the Walsh code was used for spreading. Additional codes that may be used in a practical system were not considered. This is because the orthogonality between users in a synchronous system is due to spreading by the Walsh codes. Any spreading caused by other spreading codes should have no significant effect on the orthogonality between users. For these simulations the channel was considered to be ideal, with no losses or multipath effects. The only non-ideality considered was random chip offsets between the transmitted messages. This is to simulate a system with random synchronization errors. For a maximum allowed shift a, each signal was allowed to shift by [ a, a + 1,,0,, a 1, a] chips with respect to a perfect system with no shift. The distribution of shifts was assumed to be uniform, with a assumed to be an integer. These simulations will test the effect of increasing the maximum allowed shift on the error distribution at the receiver versus the chunk size of the data. It is assumed in these simulations that these relative shifts are random, but that the receiver knows what they are. This is a reasonable assumption because in real CDMA systems the timing information is encoded within the signals to allow the receiver to properly synchronize the signals. 45

56 5.2 Simulation Model Under these assumptions, a basic DS-CDMA system was created in MATLAB to simulate the effect of chunking on a system in which the users are not perfectly synchronized. The block diagram of the system is shown in figure 25. # Symbols/Chunk Maximum Shift Size # Messages # Symbols/Chunk Message Signals Encoded Composite Encoder Signals Channel Signal Decoder Shift/User Decoded Messages Figure 25: System Block Diagram The encoder takes a set of binary finite length message signals represented by -1 s and 1 s, and encodes them in chunks using the Walsh code. The number of messages must be a power of 2, due to the number of Walsh codes being a power of 2. There is no restriction on the length of the messages. The number of symbols per chunk must be a factor of the length of the message signals. The output of the encoder is a set of chunked DS-CDMA encoded messages. The channel takes these chunked DS-CDMA encoded messages from the encoder, and randomly circularly shifts them within the range specified by maximum shift size. It then sums all of the shifted encoded messages to create a composite signal. All of the random shift values and the composite signal are then output to the decoder. The decoder receives the composite signal and shift information, along with the number of symbols per chunk and number of messages. Using this information, it 46

57 decodes each message. This is done by shifting the composite signal to undo any shifting done in the channel, then multiplying it by the appropriate Walsh sequence. Each signal is then integrated using the summing revolver to decode the original messages. 5.3 General Practices All simulations used a set of 64 users to match the IS-95 standard. The length of the message blocks was arbitrarily chosen to be 64 symbols. Because of the highly divisible nature of 64, this allowed for many different chunk sizes to be tested. The message signals were random set of -1 s and 1 s, with an equal probability of each. When finding the bit error rate, simulations generally followed the rule that a symbol 0 is a 1, while a symbol < 0 is a -1. Simulations were generally repeated many times to gather representative data. 47

58 6 Simulation Results Using the simulation model, many simulations were performed to determine the characteristics of the system in a quasi-synchronous environment. 6.1 Walsh Cover Cross Correlation The cross correlations between all combinations of Walsh covers in a 64 user system were found for several different chunk sizes. The magnitude of these cross correlations were averaged together and normalized resulting in figure 26. Figure 26: Cyclic Cross Correlation between Chunked Walsh Codes From this plot, we can clearly see that the Walsh cover used in a system with no chunking has poor cross correlational characteristics when there is any time offset between users. Chunked Walsh covers clearly have superior cross correlations at small 48

59 delays. As the chunk size increases, the rate at which the Walsh covers lose orthogonality decreases. This promises manageable amounts of multiple access interference, given that the chunk size is large enough to accommodate the magnitude of the synchronization errors. 6.2 Spreading Properties Spectrum of Non-Chunked System To characterize the spreading properties of the system, the spectral characteristics of the encoding process were found using the FFT (Fast Fourier Transform). First, the system was run with no chunking, chunk size = 1 symbol. Without chunking, the message is not compressed and repeated. The spectrum of a typical pseudorandom message is shown in figure 27. Figure 27: Compressed Message Spectrum 49

60 This signal is then spread by an arbitrary Walsh cover. In this case, the Walsh cover is applied at 64 times the bit rate of the message. To accomplish this, the Walsh cover must be repeated for every symbol. This makes the Walsh cover highly periodic, resulting in spreading of the message signal to only a few discrete locations. The resulting encoded message spectrum and the spectrum of the Walsh cover are shown in figure 28. Figure 28: Encoded Message Spectrum vs. Walsh Code Spectrum This case would be considered poorly spread, because the signal is concentrated at specific frequencies rather than being uniformly distributed across the bandwidth. This makes the non-chunked system vulnerable to frequency selective interference Spectrum of a Chunked System With a large chunk size, the Walsh cover is applied at a much lower data rate and the signal itself is compressed and repeated at a much higher data rate. Since the message 50

61 is a much higher data rate than the Walsh cover, it can be viewed as the Walsh cover being spread by the message. Figure 29 shows the spectrum of an arbitrary Walsh cover in this case. Figure 29: Walsh Code Spectrum 51

62 This signal is spread by the compressed and repeated message, as shown in figure 30. Figure 30: Chunked Encoded Message Spectrum The message is still repeated, making it appear as a periodic message. However, the message is much longer and much more random than the Walsh code, so it has much more uniform frequency spectrum. The result is that the Walsh code is spread to many discrete locations. This results in a much more uniformly spread spectrum. This system is much more frequency diverse than the system with no chunking, meaning that it should be more resilient to all forms of frequency selective interference. 52

63 6.3 Simulations of Complete System Error Distributions Using the developed MATLAB simulation, the error distribution of the system with various chunk sizes and a random shift magnitude of 1 chip was found. This means that each message within the set can shift by either -1,0,1 chips. These simulations were performed with 64 users, transmitting messages in blocks 64 symbols long. Each simulation was run 100 times to collect more data points. Figure 31 plots the received error magnitude distribution that resulted from this simulation using the raw values of the received data. The error is simply the difference between the decoded symbol and the encoded symbol. Figure 31: Error Distributions for Varying Chunk Sizes 53

64 These plots appear to follow an approximately Gaussian distribution with a mean of roughly zero. As the chunk size increases, we can clearly see that the variance of the distribution greatly decreases. This suggests that the bit error rate must greatly improve as the chunk size increases. To compare the properties of these simulations the mean and variance of the error magnitudes vs. chunk size were plotted in figures 32 and 33. Figure 32: Mean Error vs. Chunk Size This plot confirms that the mean error is small for all of the simulated cases. There does not appear to be a relationship between the chunk size and mean error. This suggests that this chunking does not introduce any source of systematic error that skews the results in either direction. 54

65 Figure 33: Error Variance vs. Chunk Size The error variance clearly decreases rapidly as the chunk size increases as was observed in the previous plots. With the exception of the first point, each doubling of the chunk size appears to halve the error variance. A decreasing error variance, with a constant mean suggests that chunking the data should improve the bit error rate. To confirm this, the bit error rate was calculated for the same system, figure 34. To calculate an approximate bit error rate, received symbols greater than or equal to 0 were assigned a value of 1, and received symbols less than 0 were assigned a value of

66 Figure 34: Bit error rate vs. Chunk Size This plot shows that the bit error rate does decrease as the chunk size increases, as was predicted previously. Here we can see that the bit error rate drops from about 7.2% in a non-chunked system down to about 0.1% in a system with a chunk size of 64. We can see a trend that the error rate roughly halves every time the chunk size doubles. These results suggest that using a large chunk size greatly reduces the effect of synchronization errors Effect of increasing Shift Magnitude To further explore the effect of synchronization errors, the same simulations were performed. However, this time the size of the shift was allowed to be greater than 1 chip. In this simulation, each user transmitted with a random shift ranging from a to a, where a is the maximum shift size in chips. The maximum shift was varied from 0 to 64 chips, 56

67 for many different signals with different chunk sizes. The error variance of these received distributions was plotted versus the maximum shift size in figure 35. Figure 35: Error Variance vs. Maximum Shift Size The error variance is clearly related to the chunk size, with the larger chunk sizes having lower error variance for any maximum allowed shift size. This suggests a lower corresponding bit error rate for all maximum shifts for these chunked signals. To confirm this, the bit error rate was plotted under the same conditions in figure

68 Figure 36: Bit error rate vs. Maximum Shift Size As expected, the system with the largest chunk size had the lowest bit error rate for all shift sizes. It also appears as though the system with no interleaving had the worst performance. From the data, it would appear that there is a linear trend between the bit error rate and the maximum shift size. This linear trend only continues until the bit error rate is approximately 13%, after which the bit error rate appears to remain constant. As the chunk size decreases the slope of the curve appears to increase, with the system with no chunking having the steepest slope Error Magnitude vs. Symbol Position Since it was clear that the chunked systems appear to have reduced sensitivity to small synchronization errors, we would like to investigate the location of these errors to 58

69 determine if there are any patterns. Any patterns in the distributions may suggest the possibility of adding guard bands. To determine this, the simulations were performed again, and each symbol was evaluated individually. This was repeated for several different maximum shifts and chunk sizes. With the shift confined to a maximum of 1 chip, the error magnitude is plotted for each symbol position from a single run in in figure 37. Figure 37: Error Magnitude by Position for Maximum Allowed Shift = 1 Chip With a chunk size of 1 symbol, there is no clear pattern in magnitude of the errors. However, for larger chunks there does appear to be a pattern. The 4 symbol chunked 59

70 signals have a slight pattern, while the 16 and 64 symbol chunks clearly have clusters of high error bits. These clusters are equally spaced, and only appear to be 4 symbols wide. With the exception of a few channels, all channels appear to have roughly the same error distribution. To determine whether this pattern holds true in systems that allow for greater synchronization errors, the simulation was repeated. However, this time the signals were allowed to shift by up to 2 chips. The results of this simulation are shown in figure 38. Figure 38: Error Magnitude by Position for Maximum Allowed Shift = 2 Chips 60

71 These plots show the same general pattern as the previous figure. However, the clusters of high error symbols have clearly grown larger. All patterns in the 4 symbol chunk plot appear to have disappeared, as the clusters overlapped each other Bit Error Rate vs. Symbol Number Because the errors seem be dependent entirely on the symbol number and not the channel number, the simulation was run again. This time, the bit error rate for each symbol position was calculated. This was done by running the simulation 100 times, and considering all of the errors for each symbol position without consideration for the channel number. Because there are 64 channels, that means that each bit error rate had a total of 64*100=6400 bits from which the calculations were performed. The results of this simulation for several different maximum shifts and chunk sizes are shown in figures

72 Figure 39: Bit Error Rate vs. Position, Chunk Size = 1 Symbol For the system with no chunking, the bit error rate is constant across the messages and increases as the maximum shift is increased. In this case, the bit error rate is relatively high for all of the shifts. This suggests that the non-chunked system would behave poorly in a quasi-synchronous environment. The fact that the bit error rate is constant across the entire set of messages means that guard bands would be of no use in this case. 62

73 Figure 40: Bit Error Rate vs. Position, Chunk Size = 4 Symbols With a chunk size of 4 symbols, the bit error rate is clearly much lower for all of the maximum shifts than the non-chunked case. The bit error rate still appears to be uniform across the messages. However, for the lower allowed maximum shifts, there is a new pattern emerging. For the maximum shift of 1 and 2 chips, the bit error rate is clearly dependent on the symbol position. For the maximum shift equal to 1 chip for example, it appears as the bit error rate alternates between 1% and 3%. 63

74 Figure 41: Received Bit Error Rate vs. Position, Chunk Size = 16 Symbols With a chunk size of 16, this figure is clearly demonstrating a strong pattern for all of the maximum shift sizes. There are even some locations where the bit error rate is equal to zero. For all of the maximum shift sizes, there is a peak in the bit error rate at 4 locations located 16 symbols apart from each other. The width and maximum bit error rate of each peak appear to increase with the maximum chip sizes. 64

Lecture 9: Spread Spectrum Modulation Techniques

Lecture 9: Spread Spectrum Modulation Techniques Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth

More information

CDMA - QUESTIONS & ANSWERS

CDMA - QUESTIONS & ANSWERS CDMA - QUESTIONS & ANSWERS http://www.tutorialspoint.com/cdma/questions_and_answers.htm Copyright tutorialspoint.com 1. What is CDMA? CDMA stands for Code Division Multiple Access. It is a wireless technology

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

Lecture 3 Cellular Systems

Lecture 3 Cellular Systems Lecture 3 Cellular Systems I-Hsiang Wang ihwang@ntu.edu.tw 3/13, 2014 Cellular Systems: Additional Challenges So far: focus on point-to-point communication In a cellular system (network), additional issues

More information

Wireless Medium Access Control and CDMA-based Communication Lesson 14 CDMA2000

Wireless Medium Access Control and CDMA-based Communication Lesson 14 CDMA2000 Wireless Medium Access Control and CDMA-based Communication Lesson 14 CDMA2000 1 CDMA2000 400 MHz, 800 MHz, 900 MHz, 1700 MHz, 1800 MHz, 1900 MHz, and 2100 MHz Compatible with the cdmaone standard A set

More information

Chapter 7. Multiple Division Techniques

Chapter 7. Multiple Division Techniques Chapter 7 Multiple Division Techniques 1 Outline Frequency Division Multiple Access (FDMA) Division Multiple Access (TDMA) Code Division Multiple Access (CDMA) Comparison of FDMA, TDMA, and CDMA Walsh

More information

RADIO LINK ASPECT OF GSM

RADIO LINK ASPECT OF GSM RADIO LINK ASPECT OF GSM The GSM spectral allocation is 25 MHz for base transmission (935 960 MHz) and 25 MHz for mobile transmission With each 200 KHz bandwidth, total number of channel provided is 125

More information

Spread Spectrum Techniques

Spread Spectrum Techniques 0 Spread Spectrum Techniques Contents 1 1. Overview 2. Pseudonoise Sequences 3. Direct Sequence Spread Spectrum Systems 4. Frequency Hopping Systems 5. Synchronization 6. Applications 2 1. Overview Basic

More information

SC - Single carrier systems One carrier carries data stream

SC - Single carrier systems One carrier carries data stream Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each

More information

CDMA Principle and Measurement

CDMA Principle and Measurement CDMA Principle and Measurement Concepts of CDMA CDMA Key Technologies CDMA Air Interface CDMA Measurement Basic Agilent Restricted Page 1 Cellular Access Methods Power Time Power Time FDMA Frequency Power

More information

Multiplexing Module W.tra.2

Multiplexing Module W.tra.2 Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at

More information

<3rd generation CDMA wireless systems>

<3rd generation CDMA wireless systems> Page 1 Overview What is 3G? A brief overview of IS95 Key design choices for CDMA 3G systems. Bandwidth Modulation Coding Power Control

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communications TCS 455 Dr. Prapun Suksompong prapun@siit.tu.ac.th Lecture 21 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read Chapter 9: 9.1 9.5 HW5 is posted.

More information

Multiple Access Techniques for Wireless Communications

Multiple Access Techniques for Wireless Communications Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Multiple Access, GSM, and IS-95 ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2003 Lecture 9: Multiple Access, GSM, and IS-95 Outline: Two other important issues related to multiple access space division with smart

More information

WCDMA Basics Chapter 2 OBJECTIVES:

WCDMA Basics Chapter 2 OBJECTIVES: WCDMA Basics Chapter 2 This chapter is designed to give the students a brief review of the WCDMA basics of the WCDMA Experimental System. This is meant as a review only as the WCDMA basics have already

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

CH 4. Air Interface of the IS-95A CDMA System

CH 4. Air Interface of the IS-95A CDMA System CH 4. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 Spread spectrum (SS) Historically

More information

An Overview of the QUALCOMM CDMA Digital Cellular Proposal

An Overview of the QUALCOMM CDMA Digital Cellular Proposal An Overview of the QUALCOMM CDMA Digital Cellular Proposal Zeljko Zilic ELE 543S- Course Project Abstract.0 Introduction This paper describes a proposed Code Division Multiple Access (CDMA) digital cellular

More information

CH 5. Air Interface of the IS-95A CDMA System

CH 5. Air Interface of the IS-95A CDMA System CH 5. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data

More information

Spread Spectrum: Definition

Spread Spectrum: Definition Spread Spectrum: Definition refers to the expansion of signal bandwidth, by several orders of magnitude in some cases, which occurs when a key is attached to the communication channel an RF communications

More information

Cellular Wireless Networks. Chapter 10

Cellular Wireless Networks. Chapter 10 Cellular Wireless Networks Chapter 10 Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells Each cell is served by base station consisting of transmitter,

More information

Multipath signal Detection in CDMA System

Multipath signal Detection in CDMA System Chapter 4 Multipath signal Detection in CDMA System Chapter 3 presented the implementation of CDMA test bed for wireless communication link. This test bed simulates a Code Division Multiple Access (CDMA)

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY

S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY A seminar report on Orthogonal Frequency Division Multiplexing (OFDM) Submitted by Sandeep Katakol 2SD06CS085 8th semester

More information

Multiple Access Techniques

Multiple Access Techniques Multiple Access Techniques EE 442 Spring Semester Lecture 13 Multiple Access is the use of multiplexing techniques to provide communication service to multiple users over a single channel. It allows for

More information

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks ISHIK UNIVERSITY Faculty of Science Department of Information Technology 2017-2018 Fall Course Name: Wireless Networks Agenda Lecture 4 Multiple Access Techniques: FDMA, TDMA, SDMA and CDMA 1. Frequency

More information

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU

Part 3. Multiple Access Methods. p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU Part 3. Multiple Access Methods p. 1 ELEC6040 Mobile Radio Communications, Dept. of E.E.E., HKU Review of Multiple Access Methods Aim of multiple access To simultaneously support communications between

More information

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE

Page 1. Overview : Wireless Networks Lecture 9: OFDM, WiMAX, LTE Overview 18-759: Wireless Networks Lecture 9: OFDM, WiMAX, LTE Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/

More information

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday

Lecture 7: Centralized MAC protocols. Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Lecture 7: Centralized MAC protocols Mythili Vutukuru CS 653 Spring 2014 Jan 27, Monday Centralized MAC protocols Previous lecture contention based MAC protocols, users decide who transmits when in a decentralized

More information

Technical Aspects of LTE Part I: OFDM

Technical Aspects of LTE Part I: OFDM Technical Aspects of LTE Part I: OFDM By Mohammad Movahhedian, Ph.D., MIET, MIEEE m.movahhedian@mci.ir ITU regional workshop on Long-Term Evolution 9-11 Dec. 2013 Outline Motivation for LTE LTE Network

More information

UNIK4230: Mobile Communications. Abul Kaosher

UNIK4230: Mobile Communications. Abul Kaosher UNIK4230: Mobile Communications Abul Kaosher abul.kaosher@nsn.com Multiple Access Multiple Access Introduction FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

CDMA Tutorial April 29, Michael Souryal April 29, 2006

CDMA Tutorial April 29, Michael Souryal April 29, 2006 Michael Souryal April 29, 2006 Common Components Encoding, modulation, spreading Common Features/Functionality Power control, diversity, soft handoff System Particulars cdmaone (IS-95) cdma2000 Sources:

More information

Multi-Carrier Systems

Multi-Carrier Systems Wireless Information Transmission System Lab. Multi-Carrier Systems 2006/3/9 王森弘 Institute of Communications Engineering National Sun Yat-sen University Outline Multi-Carrier Systems Overview Multi-Carrier

More information

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff CDMA Mobile Communication & IS-95 1 Outline Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff 2 Spread Spectrum A

More information

PERFORMANCE ANALYSIS OF DOWNLINK POWER CONTROL IN WCDMA SYSTEM

PERFORMANCE ANALYSIS OF DOWNLINK POWER CONTROL IN WCDMA SYSTEM PERFORMANCE ANALYSIS OF DOWNLINK POWER CONTROL IN WCDMA SYSTEM Dr. M. Mahbubur Rahman, Md. Khairul Islam, Tarek Hassan-Al-Mahmud, A. R. Mahmud Abstract: WCDMA (Wideband Code Division Multiple Access) plays

More information

Level 6 Graduate Diploma in Engineering Wireless and mobile communications

Level 6 Graduate Diploma in Engineering Wireless and mobile communications 9210-119 Level 6 Graduate Diploma in Engineering Wireless and mobile communications Sample Paper You should have the following for this examination one answer book non-programmable calculator pen, pencil,

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Wednesday 15:30-16:30 Friday 9:30-10:30 Spread spectrum (SS) Historically spread spectrum was

More information

CDMA Systems Engineering Handbook

CDMA Systems Engineering Handbook CDMA Systems Engineering Handbook Jhong Sam Lee Leonard E. Miller Artech House Boston London Table of Contents Preface xix CHAPTER 1: INTRODUCTION AND REVIEW OF SYSTEMS ANALYSIS BASICS 1 1.1 Introduction

More information

EC 551 Telecommunication System Engineering. Mohamed Khedr

EC 551 Telecommunication System Engineering. Mohamed Khedr EC 551 Telecommunication System Engineering Mohamed Khedr http://webmail.aast.edu/~khedr 1 Mohamed Khedr., 2008 Syllabus Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week

More information

CS 218 Fall 2003 October 23, 2003

CS 218 Fall 2003 October 23, 2003 CS 218 Fall 2003 October 23, 2003 Cellular Wireless Networks AMPS (Analog) D-AMPS (TDMA) GSM CDMA Reference: Tanenbaum Chpt 2 (pg 153-169) Cellular Wireless Network Evolution First Generation: Analog AMPS:

More information

Chapter 7 Multiple Division Techniques for Traffic Channels

Chapter 7 Multiple Division Techniques for Traffic Channels Introduction to Wireless & Mobile Systems Chapter 7 Multiple Division Techniques for Traffic Channels Outline Introduction Concepts and Models for Multiple Divisions Frequency Division Multiple Access

More information

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS Dr. Ali Muqaibel SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS VERSION 1.1 Dr. Ali Hussein Muqaibel 1 Introduction Narrow band signal (data) In Spread Spectrum, the bandwidth W is much greater

More information

CHAPTER 6 SPREAD SPECTRUM. Xijun Wang

CHAPTER 6 SPREAD SPECTRUM. Xijun Wang CHAPTER 6 SPREAD SPECTRUM Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 13 2. Tse, Fundamentals of Wireless Communication, Chapter 4 2 WHY SPREAD SPECTRUM n Increase signal

More information

OFDMA and MIMO Notes

OFDMA and MIMO Notes OFDMA and MIMO Notes EE 442 Spring Semester Lecture 14 Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier modulation technique extending the concept of single subcarrier modulation

More information

6 Uplink is from the mobile to the base station.

6 Uplink is from the mobile to the base station. It is well known that by using the directional properties of adaptive arrays, the interference from multiple users operating on the same channel as the desired user in a time division multiple access (TDMA)

More information

W-CDMA for UMTS Principles

W-CDMA for UMTS Principles W-CDMA for UMTS Principles Introduction CDMA Background/ History Code Division Multiple Access (CDMA) Why CDMA? CDMA Principles / Spreading Codes Multi-path Radio Channel and Rake Receiver Problems to

More information

TELE4652 Mobile and Satellite Communication Systems

TELE4652 Mobile and Satellite Communication Systems TELE4652 Mobile and Satellite Communication Systems Lecture 10 IS-95 CDMA A second generation cellular standard, based on CDMA technology, was proposed by Qualcomm in the early 1990s. It was standardised

More information

CHAPTER 2 WIRELESS CHANNEL

CHAPTER 2 WIRELESS CHANNEL CHAPTER 2 WIRELESS CHANNEL 2.1 INTRODUCTION In mobile radio channel there is certain fundamental limitation on the performance of wireless communication system. There are many obstructions between transmitter

More information

Mobile Communication Systems. Part 7- Multiplexing

Mobile Communication Systems. Part 7- Multiplexing Mobile Communication Systems Part 7- Multiplexing Professor Z Ghassemlooy Faculty of Engineering and Environment University of Northumbria U.K. http://soe.ac.uk/ocr Contents Multiple Access Multiplexing

More information

Cellular Network. Ir. Muhamad Asvial, MSc., PhD

Cellular Network. Ir. Muhamad Asvial, MSc., PhD Cellular Network Ir. Muhamad Asvial, MSc., PhD Center for Information and Communication Engineering Research (CICER) Electrical Engineering Department - University of Indonesia E-mail: asvial@ee.ui.ac.id

More information

ORTHOGONAL frequency division multiplexing (OFDM)

ORTHOGONAL frequency division multiplexing (OFDM) 144 IEEE TRANSACTIONS ON BROADCASTING, VOL. 51, NO. 1, MARCH 2005 Performance Analysis for OFDM-CDMA With Joint Frequency-Time Spreading Kan Zheng, Student Member, IEEE, Guoyan Zeng, and Wenbo Wang, Member,

More information

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2)

Mobile & Wireless Networking. Lecture 2: Wireless Transmission (2/2) 192620010 Mobile & Wireless Networking Lecture 2: Wireless Transmission (2/2) [Schiller, Section 2.6 & 2.7] [Reader Part 1: OFDM: An architecture for the fourth generation] Geert Heijenk Outline of Lecture

More information

Transmit Diversity Schemes for CDMA-2000

Transmit Diversity Schemes for CDMA-2000 1 of 5 Transmit Diversity Schemes for CDMA-2000 Dinesh Rajan Rice University 6100 Main St. Houston, TX 77005 dinesh@rice.edu Steven D. Gray Nokia Research Center 6000, Connection Dr. Irving, TX 75240 steven.gray@nokia.com

More information

EEE 309 Communication Theory

EEE 309 Communication Theory EEE 309 Communication Theory Semester: January 2016 Dr. Md. Farhad Hossain Associate Professor Department of EEE, BUET Email: mfarhadhossain@eee.buet.ac.bd Office: ECE 331, ECE Building Part 08 Multiplexing

More information

Chapter 6 Applications. Office Hours: BKD Tuesday 14:00-16:00 Thursday 9:30-11:30

Chapter 6 Applications. Office Hours: BKD Tuesday 14:00-16:00 Thursday 9:30-11:30 Chapter 6 Applications 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Chapter 6 Applications 6.1 3G (UMTS and WCDMA) 2 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30

More information

Wireless Transmission & Media Access

Wireless Transmission & Media Access Wireless Transmission & Media Access Signals and Signal Propagation Multiplexing Modulation Media Access 1 Significant parts of slides are based on original material by Prof. Dr.-Ing. Jochen Schiller,

More information

Laboratory 5: Spread Spectrum Communications

Laboratory 5: Spread Spectrum Communications Laboratory 5: Spread Spectrum Communications Cory J. Prust, Ph.D. Electrical Engineering and Computer Science Department Milwaukee School of Engineering Last Update: 19 September 2018 Contents 0 Laboratory

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence

More information

Quick Introduction to Communication Systems

Quick Introduction to Communication Systems Quick Introduction to Communication Systems p. 1/26 Quick Introduction to Communication Systems Aly I. El-Osery, Ph.D. elosery@ee.nmt.edu Department of Electrical Engineering New Mexico Institute of Mining

More information

Multiple Access Techniques

Multiple Access Techniques Multiple Access Techniques Instructor: Prof. Dr. Noor M. Khan Department of Electrical Engineering, Faculty of Engineering, Mohammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +92

More information

EFFICIENT SMART ANTENNA FOR 4G COMMUNICATIONS

EFFICIENT SMART ANTENNA FOR 4G COMMUNICATIONS http:// EFFICIENT SMART ANTENNA FOR 4G COMMUNICATIONS 1 Saloni Aggarwal, 2 Neha Kaushik, 3 Deeksha Sharma 1,2,3 UG, Department of Electronics and Communication Engineering, Raj Kumar Goel Institute of

More information

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by

CDMA is used to a limited extent on the 800-MHz band, but is much more common in the 1900-MHz PCS band. It uses code-division multiple access by IS-95 CDMA PCS CDMA Frequency Use CDMA Channels Forward Channel Reverse Channel Voice Coding Mobile Power Control Rake Receivers and Soft handoffs CDMA Security CDMA is used to a limited extent on the

More information

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang Wireless Communication: Concepts, Techniques, and Models Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Digital communication over radio channels Channel capacity MIMO: diversity and parallel channels

More information

EECS 380: Wireless Technologies Week 7-8

EECS 380: Wireless Technologies Week 7-8 EECS 380: Wireless Technologies Week 7-8 Michael L. Honig Northwestern University May 2018 Outline Diversity, MIMO Multiple Access techniques FDMA, TDMA OFDMA (LTE) CDMA (3G, 802.11b, Bluetooth) Random

More information

CDMA & WCDMA (UMTS) AIR INTERFACE. ECE 2526-WIRELESS & CELLULAR COMMUNICATION SYSTEMS Monday, June 25, 2018

CDMA & WCDMA (UMTS) AIR INTERFACE. ECE 2526-WIRELESS & CELLULAR COMMUNICATION SYSTEMS Monday, June 25, 2018 CDMA & WCDMA (UMTS) AIR INTERFACE ECE 2526-WIRELESS & CELLULAR COMMUNICATION SYSTEMS Monday, June 25, 2018 SPREAD SPECTRUM OPTIONS (1) Fast Frequency Hopping (FFSH) Advantages: Has higher anti-jamming

More information

Wireless Medium Access Control and CDMA-based Communication Lesson 16 Orthogonal Frequency Division Medium Access (OFDM)

Wireless Medium Access Control and CDMA-based Communication Lesson 16 Orthogonal Frequency Division Medium Access (OFDM) Wireless Medium Access Control and CDMA-based Communication Lesson 16 Orthogonal Frequency Division Medium Access (OFDM) 1 4G File transfer at 10 Mbps High resolution 1024 1920 pixel hi-vision picture

More information

Part A: Spread Spectrum Systems

Part A: Spread Spectrum Systems 1 Telecommunication Systems and Applications (TL - 424) Part A: Spread Spectrum Systems Dr. ir. Muhammad Nasir KHAN Department of Electrical Engineering Swedish College of Engineering and Technology March

More information

NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS ANALYSIS OF LARGE AREA SYNCHRONOUS CODE- DIVISION MULTIPLE ACCESS (LAS-CDMA) Stephen A.

NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS ANALYSIS OF LARGE AREA SYNCHRONOUS CODE- DIVISION MULTIPLE ACCESS (LAS-CDMA) Stephen A. NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS ANALYSIS OF LARGE AREA SYNCHRONOUS CODE- DIVISION MULTIPLE ACCESS (LAS-CDMA) by Stephen A. Brooks June 2002 Thesis Advisor: Co-Advisor: R. Clark Robertson

More information

Practical issue: Group definition. TSTE17 System Design, CDIO. Quadrature Amplitude Modulation (QAM) Components of a digital communication system

Practical issue: Group definition. TSTE17 System Design, CDIO. Quadrature Amplitude Modulation (QAM) Components of a digital communication system 1 2 TSTE17 System Design, CDIO Introduction telecommunication OFDM principle How to combat ISI How to reduce out of band signaling Practical issue: Group definition Project group sign up list will be put

More information

OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK

OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK Akshita Abrol Department of Electronics & Communication, GCET, Jammu, J&K, India ABSTRACT With the rapid growth of digital wireless communication

More information

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential

More information

Chapter 1 Acknowledgment:

Chapter 1 Acknowledgment: Chapter 1 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. Manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

UNIT 4 Spread Spectrum and Multiple. Access Technique

UNIT 4 Spread Spectrum and Multiple. Access Technique UNIT 4 Spread Spectrum and Multiple Access Technique Spread Spectrum lspread spectrumis a communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission

More information

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA By Hamed D. AlSharari College of Engineering, Aljouf University, Sakaka, Aljouf 2014, Kingdom of Saudi Arabia, hamed_100@hotmail.com

More information

Lecture 13. Introduction to OFDM

Lecture 13. Introduction to OFDM Lecture 13 Introduction to OFDM Ref: About-OFDM.pdf Orthogonal frequency division multiplexing (OFDM) is well-known to be effective against multipath distortion. It is a multicarrier communication scheme,

More information

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary

ETSI SMG#24 TDoc SMG 903 / 97. December 15-19, 1997 Source: SMG2. Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary ETSI SMG#24 TDoc SMG 903 / 97 Madrid, Spain Agenda item 4.1: UTRA December 15-19, 1997 Source: SMG2 Concept Group Alpha - Wideband Direct-Sequence CDMA: System Description Summary Concept Group Alpha -

More information

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam. ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2010 Lecture 19 Today: (1) Diversity Exam 3 is two weeks from today. Today s is the final lecture that will be included on the exam.

More information

MODULATION AND MULTIPLE ACCESS TECHNIQUES

MODULATION AND MULTIPLE ACCESS TECHNIQUES 1 MODULATION AND MULTIPLE ACCESS TECHNIQUES Networks and Communication Department Dr. Marwah Ahmed Outlines 2 Introduction Digital Transmission Digital Modulation Digital Transmission of Analog Signal

More information

Page 1. Outline : Wireless Networks Lecture 6: Final Physical Layer. Direct Sequence Spread Spectrum (DSSS) Spread Spectrum

Page 1. Outline : Wireless Networks Lecture 6: Final Physical Layer. Direct Sequence Spread Spectrum (DSSS) Spread Spectrum Outline 18-759 : Wireless Networks Lecture 6: Final Physical Layer Peter Steenkiste Dina Papagiannaki Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/ Peter A. Steenkiste 1 RF introduction Modulation

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 17 Today: Spread Spectrum: (1) Frequency Hopping, (2) Direct Sequence Reading: Today Molisch 18.1, 18.2. Thu: MUSE Channel

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Information Transmission System Lab. Spread Spectrum Signal for Digital Communications Institute of Communications Engineering National Sun Yat-sen University Multiple Access Schemes Table of

More information

OFDM Systems For Different Modulation Technique

OFDM Systems For Different Modulation Technique Computing For Nation Development, February 08 09, 2008 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi OFDM Systems For Different Modulation Technique Mrs. Pranita N.

More information

Lecture 12: Summary Advanced Digital Communications (EQ2410) 1

Lecture 12: Summary Advanced Digital Communications (EQ2410) 1 : Advanced Digital Communications (EQ2410) 1 Monday, Mar. 7, 2016 15:00-17:00, B23 1 Textbook: U. Madhow, Fundamentals of Digital Communications, 2008 1 / 15 Overview 1 2 3 4 2 / 15 Equalization Maximum

More information

cdma2000 1x Rev. E Forward Link Voice Capacity

cdma2000 1x Rev. E Forward Link Voice Capacity cdma2 1x Rev. E Forward Link Voice Capacity Yucheun Jou, Peter Black, Qiang Wu, Rashid Attar, Wanlun Zhao, Bharat Ahuja, Junsheng Han Qualcomm Inc, San Diego, CA 92121, USA Abstract The forward link capacity

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.9 Async. CDMA: Gold codes and GPS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 Asynchronous

More information

Performance Analysis of n Wireless LAN Physical Layer

Performance Analysis of n Wireless LAN Physical Layer 120 1 Performance Analysis of 802.11n Wireless LAN Physical Layer Amr M. Otefa, Namat M. ElBoghdadly, and Essam A. Sourour Abstract In the last few years, we have seen an explosive growth of wireless LAN

More information

Smart antenna technology

Smart antenna technology Smart antenna technology In mobile communication systems, capacity and performance are usually limited by two major impairments. They are multipath and co-channel interference [5]. Multipath is a condition

More information

UNIT- 7. Frequencies above 30Mhz tend to travel in straight lines they are limited in their propagation by the curvature of the earth.

UNIT- 7. Frequencies above 30Mhz tend to travel in straight lines they are limited in their propagation by the curvature of the earth. UNIT- 7 Radio wave propagation and propagation models EM waves below 2Mhz tend to travel as ground waves, These wave tend to follow the curvature of the earth and lose strength rapidly as they travel away

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

3G TECHNOLOGY WHICH CAN PROVIDE AUGMENTED DATA TRANSFER RATES FOR GSM STANDARTS AND THE MODULATION TECHNIQUES

3G TECHNOLOGY WHICH CAN PROVIDE AUGMENTED DATA TRANSFER RATES FOR GSM STANDARTS AND THE MODULATION TECHNIQUES 3G TECHNOLOGY WHICH CAN PROVIDE AUGMENTED DATA TRANSFER RATES FOR GSM STANDARTS AND THE MODULATION TECHNIQUES Mustafa ALKAN Ejder ORUÇ Nur ERZEN Özgür GENÇ malkan@tk.gov.tr eoruc@tk.gov.tr nerzen@tk.gov.tr

More information

2: Diversity. 2. Diversity. Some Concepts of Wireless Communication

2: Diversity. 2. Diversity. Some Concepts of Wireless Communication 2. Diversity 1 Main story Communication over a flat fading channel has poor performance due to significant probability that channel is in a deep fade. Reliability is increased by providing more resolvable

More information

Multiple access techniques

Multiple access techniques Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ

More information

CDMA Technology : Pr. S. Flament Pr. Dr. W. Skupin On line Course on CDMA Technology

CDMA Technology : Pr. S. Flament  Pr. Dr. W. Skupin  On line Course on CDMA Technology CDMA Technology : Pr. Dr. W. Skupin www.htwg-konstanz.de Pr. S. Flament www.greyc.fr/user/99 On line Course on CDMA Technology CDMA Technology : Introduction to Spread Spectrum Technology CDMA / DS : Principle

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

Performance Evaluation of ½ Rate Convolution Coding with Different Modulation Techniques for DS-CDMA System over Rician Channel

Performance Evaluation of ½ Rate Convolution Coding with Different Modulation Techniques for DS-CDMA System over Rician Channel Performance Evaluation of ½ Rate Convolution Coding with Different Modulation Techniques for DS-CDMA System over Rician Channel Dilip Mandloi PG Scholar Department of ECE, IES, IPS Academy, Indore [India]

More information

Part A: Spread Spectrum Systems

Part A: Spread Spectrum Systems 1 Telecommunication Systems and Applications (TL - 424) Part A: Spread Spectrum Systems Dr. ir. Muhammad Nasir KHAN Department of Electrical Engineering Swedish College of Engineering and Technology February

More information